Simulating multi-user activity while maintaining original linear request order for asynchronous transactional events
A method, system and article of manufacture maintain the original order of a sequence of transactions originating from a source database and being replicated to a target database. A lockable object is associated with each transaction of the sequence of transactions from the source database. Each transaction has one or more transactional events. The transactions of the sequence of transactions have an order. The order is a commit order of the transactions in the source database. The lockable object is based on the commit order. A lock is attempted to be obtained on one or more lockable objects associated with one or more transactions of the sequence of transactions which precede a particular transaction of the sequence of transactions. In response to being unable to obtain the lock, the one or more transactional events of the one or more transactions which precede the particular transaction are serially processed.
Latest IBM Patents:
- INTERACTIVE DATASET EXPLORATION AND PREPROCESSING
- NETWORK SECURITY ASSESSMENT BASED UPON IDENTIFICATION OF AN ADVERSARY
- NON-LINEAR APPROXIMATION ROBUST TO INPUT RANGE OF HOMOMORPHIC ENCRYPTION ANALYTICS
- Back-side memory element with local memory select transistor
- Injection molded solder head with improved sealing performance
Co-pending U.S. application Ser. No. ______, entitled “Replication-Only Triggers,” filed concurrently herewith, by Clarence Madison Pruet III, International Business Machines Corporation (IBM) Docket No. SVL920040058US1, assigned to the assignee of the present invention, is incorporated herein by reference in its entirety.
Co-pending U.S. application Ser. No. ______, entitled “Support for Schema Evolution in a Multi-Node Peer-to-Peer Replication Environment,” filed concurrently herewith, by Nagaraju Inturi and Clarence Madison Pruet III, International Business Machines Corporation (IBM) Docket No. SVL920040059US1, assigned to the assignee of the present invention, is incorporated herein by reference in its entirety.
Co-pending U.S. application Ser. No. ______, entitled “Online Repair of a Replicated Table,” filed concurrently herewith, by Rajesh Govind Naicken, Clarence Madison Pruet III, and Konduru Israel Rajakumar, International Business Machines Corporation (IBM) Docket No. SVL920040060US1, assigned to the assignee of the present invention, is incorporated herein by reference in its entirety.
BACKGROUND OF THE INVENTION1.0. Field of the Invention
This invention relates to a database management system; and in particular, this invention relates to replicating data in a database management system.
2.0. Description of the Related Art
Database management systems allow large volumes of data to be stored and accessed efficiently and conveniently in a computer system. In a database management system, data is stored in database tables which organize the data into rows and columns.
The database management system responds to user commands to store and access the data. The commands are typically Structured Query Language statements such as SELECT, INSERT, UPDATE and DELETE, to select, insert, update and delete, respectively, the data in the rows and columns. The SQL statements typically conform to a SQL standard as published by the American National Standards Institute (ANSI) or the International Standards Organization (ISO).
Departments within an enterprise may have their own database management systems, typically at different sites. An enterprise typically wants to share data throughout the enterprise. A technique called replication is used to share data among multiple database management systems.
A replication system manages multiple copies of data at one or more sites, which allows the data to be shared. Data may be replicated synchronously or asynchronously. In synchronous data replication, a two-phase commit technique is used. In a two-phase commit, a transaction is applied only if all interconnected distributed sites agree to accept the transaction. Typically all hardware components and networks in the replication system must be available at all times in for synchronous replication.
Asynchronous data replication allows data to be replicated, at least on a limited basis, and thus allows for system and network failures. In one type of asynchronous replication system, referred to as primary-target, all database changes originate at the primary database and are replicated to the target databases. In another type of replication system, referred to as update-anywhere, updates to each database are applied at all other databases of the replication system.
An insert, update or delete to the tables of a database is a transactional event. A transaction comprises one or more transactional events that are treated as a unit. A commit is another type of transactional event which indicates the end of a transaction and causes the database to be changed in accordance with any inserts, updates or deletes associated with the transaction.
In some database management systems, a log writer updates a log as transactional events occur. Each transactional event is associated with an entry in the log. Each entry in the log is associated with a value representing a log position.
When a replication system is used, a user typically specifies the types of transactional events which cause data to be replicated. In addition, the user typically specifies the data which will be replicated, such as certain columns or an entire row of a table. In some embodiments, the log writer of the database management system marks certain transactional events for replication in accordance with the specified types of transactional events. The replication system reads the log, retrieves the marked transactional events, and transmits the transactional events to one or more specified target servers. The target server applies the transactional events to the replicated table(s) on the target server.
Typically, there are many events in a database management system that are processed asynchronously which also need to adhere to order. In replication processing, since transactional events are usually posted in parallel by multiple users of the database, it is difficult to maintain the linear order of the posting of the events without processing the events serially.
Therefore, there is a need for a technique to maintain order. In addition, the technique should also maintain order while allowing events to be processed, if possible, in parallel.
SUMMARY OF THE INVENTIONTo overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, various embodiments of a method, system and article of manufacture maintain the order of a sequence of transactions originating from a source database and being replicated to a target database are provided. A lockable object is associated with each transaction of the sequence of transactions from the source database. Each transaction has one or more transactional events. The transactions of the sequence of transactions have an order. The order is a commit order of the transactions in the source database. The lockable object is based on the commit order. A lock is attempted to be obtained on one or more lockable objects associated with one or more transactions of the sequence of transactions which precede a particular transaction of the sequence of transactions. In response to being unable to obtain the lock, the one or more transactional events of the one or more transactions which precede the particular transaction are serially processed.
In this way, a technique to maintain order is provided. The technique also maintains order while allowing transactional events to be processed, if possible, in parallel.
BRIEF DESCRIPTION OF THE DRAWINGSThe teachings of the present invention can be readily understood by considering the following description in conjunction with the accompanying drawings, in which:
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to some of the figures.
DETAILED DESCRIPTIONAfter considering the following description, those skilled in the art will clearly realize that the teachings of the various embodiments of the present invention can be utilized to replicate data in a database management system. A method, system and article of manufacture maintain the original order of a sequence of transactions originating from a source database and being replicated to a target database. A lockable object is associated with each transaction of the sequence of transactions from the source database. Each transaction has one or more transactional events. The transactions of the sequence of transactions have an order. The order is a commit order of the transactions in the source database. The lockable object is based on the commit order. A lock is attempted to be obtained on one or more lockable objects associated with one or more transactions of the sequence of transactions which precede a particular transaction of the sequence of transactions. In response to being unable to obtain the lock, the one or more transactional events of the one or more transactions which precede the particular transaction are serially processed.
A database server is a software application which implements a database management system. A replication server is a database server that participates in data replication. Multiple database servers can execute on the same physical server computer, and each database server can participate in replication.
In replication, changes to one or more tables of a database on a source replication server are collected, transported and applied to one or more corresponding tables on replication target servers. A replication application implements the replication server functionality.
To replicate data, a user defines a replicate, that is, the user provides a replicate definition. A replicate is associated with one or more replication servers, also referred to as participants, a table to replicate among the participants, and the columns of the table that will be replicated. The replicate is also associated with various attributes which describe how to replicate the data among the participants, such as conflict resolution rules.
The replication server maintains replication information in a replicate definition that comprises one or more tables in the global catalog. The replicate definition comprises information specifying the replicate configuration and environment, information specifying what data is to be replicated, for example, whether to replicate particular columns or an entire row, and information specifying the conditions under which the data should be replicated. The replicate definition also specifies various attributes of the replicate such as a description of how to handle any conflicts during replication.
The replication application creates the global catalog when the replication application is initialized. In embodiments which use the IBM Informix Dynamic Server, the global catalog is called the syscdr database.
Each replication server typically has its own local copy of the global catalog and maintains one or more tables in the global catalog to keep track of replicate definition and state. The global catalog is created when a database server is defined as a replication server. The tables in a global catalog on one replication server are typically automatically replicated to the global catalogs of the other replication servers.
In the target server 32, the transaction replication data 51 is received in a queue 52. An apply component 54 retrieves the transaction replication data 51 from the queue 52 and applies the replication data 51 to the appropriate table and column(s) in the database 56. For example, if the transaction replication data comprises an insert operation, the apply component performs the insert operation on a table of the replicate.
The source and target servers, 30 and 32, have global catalogs, 62 and 64, and a replication application command line interface, 66 and 68, respectively. The replication application command line interface 66 and 68 receives commands for the replication application. The replication application command line interface 66 and 68 is also used to update the global catalogs 62 and 64, respectively.
In various embodiments, the replication application on a replication server typically comprises a snooper, grouper and apply component. In this way, data can be replicated both to and from the replication server.
In some embodiments, a computer system executing the replication application comprises multiple central processing units or processors, and various portions of the replication operation are executed concurrently. For example, the apply component may execute on one or more processors and each portion of the apply component that executes on one processor is referred to as an apply thread.
In various embodiments, the transactional events of the log are operation requests. An operation request may be an insert, update or delete operation, or a post commit trigger request. In some embodiments, the log is a linear file.
It is desirable to process some transactions at a target database server in similar order to the original transactions on a source database server. The phrase “linear request order” refers to the processing of transactions, and therefore the transactional events associated with the transactions, in the same order as the original transactions. In various embodiments, the linear request order is the commit order of the transactions.
In various embodiments, linear ordered asynchronous transactional events have one or more common characteristics. One characteristic is that the transactional events of a transaction are not propagated to the other participants until the transaction that entered the transactional event request issues a commit. If the transactional events are propagated before the transaction has committed, it is possible that the transactional event will be performed on a transaction that will rollback. Therefore, the propagation of the transactional event is deferred until the original transaction has committed.
Another characteristic is that the transactional event is ordered by the associated transaction's commit in the log. As a transaction is executed, transactional event requests are placed directly into the log. These transactional event requests may comprise requests for post-commit trigger execution or replication.
Yet another characteristic is that the transactional event is executed only once. For example, the transactional event should not be repeatedly processed in the case of recovery of the database server. In various embodiments, to ensure that the transactional event is processed only once, a record of which specific transactional events have been processed is maintained in persistent storage.
The transactional events will often occur concurrently from multiple users. To continuously process incoming transactional event requests, the multi-user processing of the transactional events is simulated while maintaining the original linear order as defined by transaction commit order of the transactional events.
In various embodiments, transactions, and therefore their transactional events, are processed in parallel by using a commit progress table to record the progress of the processing of the asynchronous events. In some embodiments, the commit progress table is the post-commit progress table of co-pending U.S. application Ser. No. ______ entitled “Replication-Only Triggers,” filed concurrently herewith, by Clarence Madison Pruet III, International Business Machines Corporation (IBM) Docket No. SVL920040058US1. In various embodiments, the transactional events within a transaction are processed, the commit progress table is updated for the transactional events, and the transaction is committed. The processing of the transactional events can be performed in parallel, but the maintenance of the commit progress table and the commit of the transactions are serialized and are in proper order. The original transactional ordering is re-established as the last step in processing the transactional events.
New transactions 80, comprising new transactional event requests, are received at the target server. A pending list 82 of transactions 84 and 86 to be processed is maintained. As the transactions are received, the transactions are placed at the tail 88 of the pending list 82. As the transactions are allowed to be processed, the transactions are moved from the head 90 of the pending list 82 to the tail 92 of an active list 94. While on the active list 94, the transactions 96-1, 96-2 and 96-3, are processed in parallel using separate parallel threads. The block 96-1 labeled “Transactional Events-1” comprises one or more transactional events associated with a first transaction. The block 96-2 labeled “Transactional Events-2” comprises one or more transactional events associated with a second transaction. The block 96-3 labeled “Transactional Events-3” comprises one or more transactional events associated with a third transaction. When a processing thread for a transaction is finished, that processing thread waits until the transaction reaches the head of the active list 94. When the transaction reaches at the head of the active list 94, the thread is allowed to update the commit progress table 58 and commit the transactional events of the transaction. Block 300 represents a module that updates the commit progress table 58.
In the technique described above, a thread processing a subsequent transaction may complete its activity prior to a thread processing a previous transaction. In that case, the subsequent transaction's thread waits for the previous transaction to be processed. For example, the transactional events-1 of the first transaction committed first on the source server, the transactional events-2 of the second transaction occurred next on the source server, and the transactional events-3 of the third transaction occurred last. Each thread is executing on a separate processing unit. Suppose that thread-1 is processing transactional events-1, thread-2 is processing transactional events-2, and thread-3 is processing transactional events-3. It is possible that thread-3 could complete prior to thread-1, and thus thread-3 waits for thread-1 to complete.
In another example, suppose that thread-3 is holding a resource that thread-1 also needs to obtain. In this example, a form of a deadly embrace has occurred. This deadly embrace is not a classic deadly embrace which occurs often in a multi-user database when rows and/or pages are locked by various transactions. Rather this deadly embrace is between a commit order of the transactions, and the resources to process the transactional events associated with those transactions.
Typically, a database management system has a lock manager. In various embodiments, as a transactional event, such as an insert, update or delete, is processed, the lock manager locks the row(s) associated with that transactional event. In a classic deadly embrace, the lock manager is used to determine if a row or page is currently available for update. Based on the rows and/or pages being accessed, the lock manager detects if two transactions are in a deadly embrace and will cause at least one of the transactions enter rollback mode to resolve the blockage.
It is desirable to detect a deadly embrace between the commit order of a transaction and a resource. In various embodiments, a resource is simulated by associating the order of a transaction with a lockable object, such as a pseudo-row or alternately a row of a table, which can be locked using the lock manager. Using the lockable object, the lock manager can be used to detect a deadly embrace between the commit order of a transaction and a resource. Various embodiments of the invention will be described with respect to a lockable object that is a pseudo-row; however, in other embodiments, the lockable object is a row of a table rather than a pseudo-row.
The pseudo-row can be obtained by using the commit order as though it were a row identifier. As the transactional events of transaction containing events are placed on the pending list, the transaction is assigned, or associated with, a row identifier, that is, a “rowid,” based on the order that that the transactional events of the transaction are placed on the pending list. In some embodiments, the row identifier is a pseudo-rowid. Continuing the above example, Transactional Events-1 of the first transaction is associated with a pseudo-rowid having a value of one. Transactional Events-2 of the second transaction is associated with a pseudo-rowid having a value of two. Transactional Events-3 of the third transaction is associated with a pseudo-rowid having a value of three.
To detect whether a deadly embrace involving the commit order has occurred, the thread which is applying the transactional events of a transaction performs the following. The thread obtains an exclusive lock on the pseudo-rowid associated with the transaction which that thread is executing. The thread processes the transactional events of the transaction. The thread then attempts to obtain shared locks on all of the pseudo-rowids of the transactions preceding the transaction that the thread is processing in the active list. If a shared lock cannot be obtained, a deadly embrace between the commit order and a resource has occurred and the transactional events of preceding transactions in the active list are processed serially. Once the transaction reaches the top of the active list, the thread updates the progress table recording the identity of this transaction that the thread is processing. In some embodiments, the thread stores a timestamp of when the transaction was committed in the progress table. The thread commits the execution of the transactional events associated with the transaction. Since the commit will free all locks held by the transaction, this will also free the exclusive lock on the pseudo-rowid associated with the transaction that the thread is executing. By removing the exclusive lock on the pseudo-rowid, subsequent transactions will be able to obtain a shared lock on the same pseudo-rowid. In this way, the lock manager can be used to detect that a deadly embrace has occurred between the commit order of the transactions and resources held by the threads processing the transactional events of the transactions.
In
In step 118, the transaction is processed. In particular, the transactional events of the transaction are processed. After the transactional events associated with a transaction are processed, but prior to committing the transaction and its associated transactional events, in step 120, the thread processing the transaction attempts to obtain shared locks on other threads. In various embodiments, the thread processing the transaction attempts to obtain a shared lock on the respective pseudo-rowids associated with preceding transactions being processed by other threads in the active list.
Step 122 determines whether a deadlock was detected in response to attempting to obtain the shared locks. If at least one shared lock was not obtained, then a deadlock has been detected. If the shared lock(s) were obtained then no deadlock was detected, and in step 124, the thread processing the transaction waits until the transaction moves to the top of the active list. In step 126, the commit progress table is updated. In various embodiments, the commit progress table contains a single row which indicates the log position associated with the commit of the last instruction which was committed on the target database. The commit progress table is updated with a log position of the commit of the transaction. In step 128, the transaction, with its associated transaction events, is committed. In step 130, the transaction is removed from the active list.
Step 132 determines whether a global serial mode flag set and whether the transaction is the last entry on the active list. If so, in step 134, the global serial flag is cleared and proceeds to step 110 to process another transaction on the pending list. At this point, because the global serial mode flag and the transaction serial flags are deactivated, the threads will process the transactional events of the transactions in parallel, that is, concurrently. If step 132 determines that the global serial mode flag is set or that the transaction is not the last entry on the active list, the flowchart proceeds to step 110 to process another transaction on the pending list.
Step 144 determines whether a deadlock was detected. If not, step 146 determines whether the transaction serial flag is set for the transaction. If not, step 146 proceeds to step 140 to determine if there are more transactional events in the transaction to process.
In response to step 144 determining that a deadlock was detected, in step 148, serial mode is set. The global serial flag is set to indicate that the transactions in the active list, and their associated transactional events, should be processed serially. In addition, each transaction in the active list is also associated with a transaction serial flag, and the transaction serial flag associated with the transactions in the active list is set to serial mode. In step 150, the transactions in the active list are processed serially, and step 150 proceeds to step 140 to determine if there are more transactional events of the transaction to process.
In response to step 122 of
The memory 210 generally comprises different modalities, illustratively semiconductor memory, such as random access memory (RAM), and disk drives. In various embodiments, the memory 210 stores an operating system 230, a database server 232, database tables 234, a log 236, and a replication application 240. In various embodiments the replication application 240 comprises a global catalog 242, a replication application command line interface module 244, a snooper 246, a grouper 248, an apply component 250, a queue 252, a pending list 254, an active list 256 and a commit progress table 258.
In various embodiments, the specific software instructions, data structures and data that implement various embodiments of the present invention are typically incorporated in the replication application 240. Generally, an embodiment of the present invention is tangibly embodied in a computer-readable medium, for example, the memory 210, and is comprised of instructions which, when executed by the processor 202, cause the computer system 200 to utilize the present invention. The memory 210 may store the software instructions, data structures and data for any of the operating system 230, a database server 232, database tables 234, a log 236, and a replication application 240 in semiconductor memory, in disk memory, or a combination thereof. Other computer memory devices presently known or that become known in the future, or combination thereof, may be used for memory 210.
The operating system 230 may be implemented by any conventional operating system such as AIX® (Registered Trademark of International Business Machines Corporation), UNIX® (UNIX is a registered trademark of the Open Group in the United States and other countries), Windows® (Registered Trademark of Microsoft Corporation), Linux® (Registered trademark of Linus Torvalds), Solaris® (Registered trademark of Sun Microsystems Inc.) and HP-UX® (Registered trademark of Hewlett-Packard Development Company, L.P.).
In various embodiments, the database server 232 is the IBM Informix Dynamic Server. However, the invention is not meant to be limited to the IBM Informix Dynamic Server and may be used with other database management systems.
In various embodiments, the present invention may be implemented as a method, system, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier or media. In addition, the software in which various embodiments are implemented may be accessible through the transmission medium, for example, from a server over the network. The article of manufacture in which the code is implemented also encompasses transmission media, such as the network transmission line and wireless transmission media. Thus the article of manufacture also comprises the medium in which the code is embedded. Those skilled in the art will recognize that many modifications may be made to this configuration without departing from the scope of the present invention.
The exemplary computer system illustrated in
The foregoing detailed description of various embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teachings. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended thereto.
Claims
1. A method of maintaining order of a sequence of transactions originating from a source database and being replicated to a target database, comprising:
- associating a lockable object with each transaction of said sequence of transactions from said source database, each transaction having one or more transactional events, said transactions of said sequence of transactions having an order, said order being a commit order of said transactions in said source database, wherein said lockable object is based on said commit order;
- attempting to obtain a lock on one or more lockable objects associated with one or more transactions of said sequence of transactions which precede a particular transaction of said sequence of transactions; and
- in response to being unable to obtain said lock, serially processing said one or more transactional events of said one or more transactions which precede said particular transaction.
2. The method of claim 1 wherein said attempting to obtain said lock attempts to obtain a shared lock.
3. The method of claim 2 further comprising:
- exclusive locking said lockable object associated with said particular transaction prior to said attempting to obtain said shared lock.
4. The method of claim 1 further comprising:
- waiting to commit said particular transaction in said target database until after said other transactions are committed in said target database.
5. The method of claim 1 wherein said lockable object is a pseudo-row.
6. The method of claim 1 wherein said lockable object is a row of a table.
7. The method of claim 1 wherein at least one of said transactions comprises a post-commit trigger request.
8. The method of claim 1 wherein said one or more transactions are processed by one or more separate threads, respectively.
9. The method of claim 1 further comprising:
- updating a commit progress table to indicate a last transaction which was committed on said target database.
10. The method of claim 1 further comprising:
- committing said particular transaction, wherein said lockable object associated with said particular transaction is unlocked in response to said committing.
11. The method of claim 1 further comprising:
- committing said particular transaction after said one or more preceding transactions are committed.
12. An article of manufacture comprising a computer usable medium embodying one or more instructions executable by a computer for performing a method of maintaining order of a sequence of transactions originating from a source database and being replicated to a target database, said method comprising:
- associating a lockable object with each transaction of said sequence of transactions from said source database, each transaction having one or more transactional events, said transactions of said sequence of transactions having an order, said order being a commit order of said transactions in said source database, wherein said lockable object is based on said commit order;
- attempting to obtain a lock on one or more lockable objects associated with one or more transactions of said sequence of transactions which precede a particular transaction of said sequence of transactions; and
- in response to being unable to obtain said lock, serially processing said one or more transactional events of said one or more transactions which precede said particular transaction.
13. The article of manufacture of claim 12 wherein said attempting to obtain said lock attempts to obtain a shared lock.
14. The article of manufacture of claim 13 wherein said method further comprises:
- exclusive locking said lockable object associated with said particular transaction prior to said attempting to obtain said shared lock.
15. The article of manufacture of claim 12 wherein said method further comprises:
- waiting to commit said particular transaction in said target database until after said other transactions are committed in said target database.
16. The article of manufacture of claim 12 wherein said lockable object is a pseudo-row.
17. The article of manufacture of claim 12 wherein said lockable object is a row of a table.
18. The article of manufacture of claim 12 wherein at least one of said transactions comprises a post-commit trigger request.
19. The article of manufacture of claim 12 wherein said one or more transactions are processed by one or more separate threads, respectively.
20. The article of manufacture of claim 12 wherein said method further comprises:
- updating a commit progress table to indicate a last transaction which was committed on said target database.
21. The article of manufacture of claim 12 wherein said method further comprises:
- committing said particular transaction, wherein said lockable object associated with said particular transaction is unlocked in response to said committing.
22. The article of manufacture of claim 12 wherein said method further comprises:
- committing said particular transaction after said one or more preceding transactions are committed.
23. A computer system to maintain order of a sequence of transactions originating from a source database and being replicated to a target database, comprising:
- a lockable object associated with each transaction of said sequence of transactions from said source database, each transaction having one or more transactional events, said transactions of said sequence of transactions having an order, said order being a commit order of said transactions in said source database, wherein said lockable object is based on said commit order; and
- a lock on one or more lockable objects associated with one or more transactions of said sequence of transactions which precede a particular transaction of said sequence of transactions, wherein in response to being unable to obtain said lock, said one or more transactional events of said one or more transactions which precede said particular transaction are serially processed.
24. The computer system of claim 23 wherein said lockable object associated with said particular transaction is exclusively locked.
25. The computer system of claim 23 wherein said lockable object is a row of a table.
26. The computer system of claim 23 wherein said lockable object is a pseudo-row.
27. The computer system of claim 23 wherein at least one of said transactions comprises a post-commit trigger request.
28. The computer system of claim 23 further comprising:
- a commit progress table to indicate a last transaction which was committed on said target database.
Type: Application
Filed: Feb 18, 2005
Publication Date: Aug 24, 2006
Patent Grant number: 7376675
Applicant: International Business Machines Corporation (Armonk, NY)
Inventor: Clarence Pruet (Flower Mound, TX)
Application Number: 11/061,071
International Classification: G06F 17/30 (20060101);